WO2011016700A2 - Procédé et appareil pour fournir un service de protection aux informations privées d'un terminal de communication mobile - Google Patents

Procédé et appareil pour fournir un service de protection aux informations privées d'un terminal de communication mobile Download PDF

Info

Publication number
WO2011016700A2
WO2011016700A2 PCT/KR2010/005183 KR2010005183W WO2011016700A2 WO 2011016700 A2 WO2011016700 A2 WO 2011016700A2 KR 2010005183 W KR2010005183 W KR 2010005183W WO 2011016700 A2 WO2011016700 A2 WO 2011016700A2
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
mobile communication
communication terminal
information
personal information
Prior art date
Application number
PCT/KR2010/005183
Other languages
English (en)
Korean (ko)
Other versions
WO2011016700A3 (fr
Inventor
김봉섭
Original Assignee
주식회사 나르샤소프트
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020090072781A external-priority patent/KR101124585B1/ko
Priority claimed from KR1020090072782A external-priority patent/KR20110015191A/ko
Application filed by 주식회사 나르샤소프트 filed Critical 주식회사 나르샤소프트
Publication of WO2011016700A2 publication Critical patent/WO2011016700A2/fr
Publication of WO2011016700A3 publication Critical patent/WO2011016700A3/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Definitions

  • the present invention relates to a security processing technology for protecting personal information stored in a personal mobile communication terminal in a mobile communication environment, and more particularly, to provide a service for protecting personal information stored in a terminal when the mobile communication terminal is stolen or lost. It relates to a method and a system.
  • mobile communication terminals have various functions. That is, with the rapid development of wireless communication and data processing technology, people can use not only voice calls but also Internet access, video communication and video message transmission using mobile communication terminals. In addition, due to the rapid dissemination of mobile communication terminals, mobile communication terminals have become an essential means of communication in modern life, such as a considerable amount of communication occurring in human relationships through mobile communication terminals.
  • the mobile communication terminal is recognized as an important information device such as a personal network computer rather than a simple communication terminal device for the user.
  • a user may take a picture, a voice, a video, and the like by using a mobile communication terminal, and may watch a movie, a broadcast, play a game, and manage his schedule while moving.
  • a video call can be made with a counterpart in a remote place, and can be used as a navigation in a vehicle.
  • the user solves a large part of his / her daily life through the mobile communication terminal, and stores a large amount of personal information in the mobile communication terminal. Therefore, if the user is stolen or lost the mobile communication terminal, damages such as leakage or theft of personal information of the user may occur along with economic loss. In particular, as payment through a mobile phone or internet banking is becoming more common, a loss of a mobile communication terminal has a problem that can lead to serious damage.
  • the conventional method of setting a password limits the function of the terminal or limits the transmission, but can not protect the personal information stored in the terminal, there is a problem that can only be exposed to the risk of leakage and theft.
  • the present invention was devised to solve such a problem, and the information protection means provided in the mobile communication terminal is driven to automatically check whether the terminal is lost or not, and when the terminal is lost or stolen, the individual stored in the terminal. It is an object of the present invention to provide a method and system for performing security processing on information.
  • the present invention broadcasts the broadcast information including the terminal loss signal in the area where the mobile communication terminal is stolen or lost, the mobile communication terminal receives the connection to the information protection operation server to check whether the terminal is lost, information security It is yet another object to provide a method and a system which enable the processing to be carried out.
  • the method for providing a personal information protection service of a mobile communication terminal provides a security processing service for protecting personal information stored in a terminal in order to prevent leakage of personal information due to theft or loss of the mobile communication terminal.
  • a method comprising: (a) driving an information protection means provided in a mobile communication terminal to access an information protection operating server in which status information of the mobile communication terminal is registered; (b) checking, by the information security operating server, whether the terminal is lost or not; And (c) performing a preset personal information security process on the information protection means when it is determined that the terminal is in a lost state.
  • a system for providing a security processing service for protecting personal information stored in the terminal may include: A registered information security operation server; And a mobile communication terminal provided with information protection means for accessing the information protection operating server to check whether the terminal is lost or not, and performing a preset personal information security process when it is determined that the terminal is lost. Characterized in that.
  • the method for providing a personal information protection service of a mobile communication terminal provides a security processing service for protecting personal information stored in a terminal in order to prevent leakage of personal information due to theft or loss of the mobile communication terminal.
  • a method of receiving a lost or lost report of a mobile communication terminal (b) broadcasting a terminal loss signal through a broadcasting channel in an area in which the reported loss of mobile communication terminal is located; (c) a mobile communication terminal receiving a broadcast including the terminal loss signal, accessing an information protection operating server in which the loss status information of the mobile communication terminal is registered; And (d) checking, by the information security operating server, whether the terminal is lost or not, and if it is determined that the terminal is in a lost state, performing a preset personal information security process on the information protection means provided in the terminal. It is characterized by including.
  • a system for providing a security processing service to protect personal information stored in a terminal in order to prevent leakage of personal information due to theft or loss of the mobile communication terminal reports a theft or loss of the mobile communication terminal
  • An information protection operation server that receives and registers and manages whether the mobile communication terminal has lost status information, and controls a terminal lost signal to be broadcasted through a broadcast channel in a region where the reported loss of mobile communication terminal is located; And receiving a broadcast including a terminal loss signal through a broadcast channel, accesses the information protection operation server, checks whether the terminal is lost or not, and performs a preset personal information security process when the terminal is confirmed to be in a lost state.
  • a mobile communication terminal provided with an information protection means.
  • the mobile communication terminal is provided with an information protection means which is always driven with the activation of the terminal, and periodically or in real time connected to the operation server that registers and manages the terminal loss status information to check whether the loss status.
  • the security information on the personal information stored in the terminal is performed immediately so that the terminal can recognize the lost status immediately and the security processing of the stored personal information is performed with the recognition. And more effective protection.
  • the terminal when the terminal is lost, even if the terminal does not take a separate action, the terminal itself accesses the operation server and checks whether the terminal is lost.In case of the lost state, information security processing is performed. Since the call does not need to be connected, there is an effect that the information protection process can be performed more efficiently.
  • FIG. 1 is a diagram showing the configuration of a system that implements a method for providing a personal information protection service of a mobile communication terminal according to a first embodiment of the present invention.
  • FIG. 2 is a diagram illustrating a configuration of a mobile communication terminal in a system for providing personal information protection service of a mobile communication terminal according to the first embodiment of the present invention.
  • 3 is a diagram illustrating an example of terminal lost state information stored in a database in the lost state information DB.
  • FIG. 4 is a flowchart illustrating a procedure of a method for providing a personal information protection service of a mobile communication terminal according to the first embodiment of the present invention.
  • FIG. 5 is a diagram illustrating a signal flow between nodes in a method of providing a personal information protection service of a mobile communication terminal according to a first embodiment of the present invention.
  • FIG. 6 is a diagram showing the configuration of a system that implements a method for providing a personal information protection service of a mobile communication terminal according to a second embodiment of the present invention.
  • FIG. 7 is a diagram illustrating a configuration of an information security operation server in a system for providing a personal information protection service for a mobile communication terminal according to a second embodiment of the present invention.
  • FIG. 8 is a diagram illustrating a configuration of a mobile communication terminal in a system for providing a personal information protection service of a mobile communication terminal according to a second embodiment of the present invention.
  • FIG. 9 is a flowchart illustrating a procedure of a method for providing a personal information protection service of a mobile communication terminal according to a second embodiment of the present invention.
  • FIG. 10 is a diagram illustrating a procedure for performing information protection processing of a lost terminal according to each node according to a method for providing a personal information protection service of a mobile communication terminal according to a second embodiment of the present invention.
  • the method for providing a personal information protection service of a mobile communication terminal is a method of providing a security processing service for protecting personal information stored in a terminal in order to prevent leakage of personal information due to theft or loss of the mobile communication terminal.
  • the system for providing a security processing service for protecting personal information stored in the terminal in order to prevent leakage of personal information due to theft or loss of the mobile communication terminal accepts the report of theft or loss of the mobile communication terminal And an information protection operation server configured to register and manage the status information of whether the mobile communication terminal is lost, and to broadcast the terminal loss signal through a broadcast channel to an area in which the reported loss of the mobile communication terminal is located; And receiving a broadcast including a terminal loss signal through a broadcast channel, accesses the information protection operation server, checks whether the terminal is lost or not, and performs a preset personal information security process when the terminal is confirmed to be in a lost state. And a mobile communication terminal provided with an information protection means.
  • FIG. 1 is a diagram showing the configuration of a system that implements a method for providing a personal information protection service of a mobile communication terminal according to a first embodiment of the present invention.
  • a mobile communication terminal 100 provided with information protection means and an information protection operation server 200 including a database 210 are provided in a mobile communication network. Connected through.
  • the customer center 310 is connected to the information protection operation server 200, the customer 400 requests the stolen or lost reception to the customer center 310 or the information protection operation server 200.
  • the information protection operation server 200 plays a role of storing and managing the lost state information of the terminal in the lost state information database 210 according to the loss or theft reception of the mobile communication terminal 100.
  • the information security operation server 200 is connected to a mobile communication network, and is a server device that the mobile communication terminal 100 can access through a mobile communication network.
  • the information security operation server 200 is received through the customer center 310 received the accident or theft, and receives the fact that the registration of the lost state of the terminal in the database 210.
  • the terminal 400 may receive a lost or stolen receipt of the terminal directly from the customer 400 through wired / wireless communication means and offline. In this case, the lost state registration process of the corresponding terminal is performed in the database 250 together with the reception.
  • the customer center 310 is an on / offline service center for mobile subscribers operating in a mobile communication system.
  • the customer center 310 performs customer service, and a terminal loss and theft report reception process is included in one of these services. After receiving the loss report, the customer center 310 provides the fact of receiving the lost accident to the information protection operation server 200 to register the lost state of the terminal in the lost state information database 210 provided in the server.
  • the customer 400 reports the loss to the customer center 310 or the information protection operation server 200 when the mobile terminal owned by the customer is lost or stolen. At this time, the customer center 310 or the information security operation server 200 to perform the authentication process of identity verification and whether or not the user terminal, and proceed with the loss acceptance procedure.
  • the lost state information database 250 determines whether the lost state information of the mobile communication terminal is stored as a database.
  • 3 is a diagram illustrating an example of terminal lost state information stored and managed in the lost state information database 250.
  • the lost state information database 250 records whether identification information for distinguishing terminals and whether the lost state information of each terminal is a normal state or a lost state. In the example of the figure, it is recorded that the identification information # 003 terminal is currently lost.
  • the lost state information database 250 When the loss report is received, the lost state information database 250 immediately registers and stores the lost state in the lost or not state information corresponding to the identification information of the corresponding terminal by the information protection operation server 200. In addition, when the lost state of the terminal is resolved or a loss release request is received from a customer, the lost state information of the terminal is also normally recorded and stored in the lost state information database 210.
  • the mobile communication terminal 100 is a portable communication terminal device which is connected to a mobile communication network and receives a mobile communication service.
  • the mobile communication terminal 100 is provided with information protection means to receive a personal information protection service by interworking with the information protection operation server 200. It is a device that can.
  • the mobile communication terminal 100 will be described in more detail below with reference to the drawings.
  • FIG. 2 is a diagram illustrating a configuration of a mobile communication terminal in a system for providing personal information protection service of a mobile communication terminal according to the first embodiment of the present invention.
  • the mobile communication terminal 100 includes components of a general mobile communication terminal, including a storage module 120 in which personal information of a user is stored.
  • the information protection module 110 further includes.
  • the information protection module 110 is a means for providing a personal information protection service in connection with the information protection operation server 200 through a mobile communication network.
  • the information protection module 110 is a software program of a client or agent structure provided in the terminal and driven.
  • the information protection module 110 is always driven together with the driving of the mobile communication terminal 100 to provide a personal information protection service.
  • the information protection module 110 may be, for example, an idle screen service (or widget service) that is always executed on the mobile communication terminal.
  • the information protection module 110 includes a driving processor 111, a server connection processor 112, a loss determination unit 113, a security processor 114, a usage restriction processor 115, and the like.
  • the driving processor 111 performs an execution process so that the information protection module 110 is driven together with the driving of the terminal, and provides the personal information protection service together with the driving.
  • the server connection processing unit 112 performs a role of access processing to access the information protection operation server 200 to perform information communication.
  • the server connection processing unit 112 is provided with an access address and an access protocol to the information security operation server 200 to process a smooth connection to the server when the information protection module 110 is driven.
  • the server connection processing unit 112 may always be connected to the information protection operating server 200, or may be connected at regular time intervals.
  • the load on the terminal, the server, and the communication network increases, but it is possible to check whether the terminal is lost in the information protection operating server 200 in real time, so that there is an advantage that can be immediately dealt with when registering the lost state.
  • the load on the terminal, server, and communication network can be reduced, but some time delay may occur in real time loss status check and response.
  • the loss status determination unit 113 checks the database 210 of the information protection operation server 200 and checks whether the current terminal is in a lost state. That is, the loss status determination unit 113 monitors whether the terminal is registered in the lost state in the operation server 200 connected through the server connection processing unit 112. In this case, when the corresponding terminal is registered in the lost state, it performs a role of informing the security processing unit 114 to be described later.
  • the security processing unit 114 When it is determined that the terminal is in a lost state, the security processing unit 114 performs a security process for the personal information stored in the terminal. That is, the security processing unit 114 performs the personal information security processing according to a preset scenario at the moment when the loss status is confirmed by the loss determination unit 113.
  • the personal information security processing executes a preset security processing scenario.
  • Examples of the security processing scenario include deletion of personal information, backup processing of personal information, encryption processing of personal information, lost location transmission processing, and peripheral information.
  • the transfer process, the process of initializing a mobile communication terminal, etc. are mentioned.
  • the process of initializing the mobile communication terminal means resetting the mobile communication terminal to the initial release state.
  • the deletion process is a process of preventing the leakage of personal information by deleting the personal information 121 stored in the storage module 120 of the terminal.
  • the backup process is a process of transmitting personal information to the information protection operation server 200 being accessed, and then deleting the personal information to prevent leakage after information backup.
  • the encryption process is a process of receiving the encryption key from the information protection operation server 200 being connected, encrypting the personal information being stored in the storage module 120, and then re-storing it.
  • the encryption key may be stored in the terminal from the beginning.
  • the decryption key corresponding to the encryption key is received to restore the personal information data.
  • the lost location transmission process is a process of transmitting the current location information of the terminal to the server that is connected after protecting the personal information in the above security processing scenario.
  • the peripheral information transmission process is a process of driving the camera of the terminal to take information of the surrounding environment and transmit it to the operating server being connected. These processes are used to provide information that can recover lost terminals.
  • the usage restriction processing unit 115 performs a role of restricting the use of the terminal when the server connection processing unit 112 fails to access or access to the information security operation server 200. This prevents the leakage of personal information by restricting the use of the terminal itself in case of malicious paralysis.
  • the storage module 120 is a recording means capable of storing data in the terminal or storing various information.
  • the personal information 121 is stored and managed in the storage module 120.
  • Examples of the personal information 121 stored in the terminal are personal identification information or financial information such as social security number, bank account number, password, phone book, call log, text message, schedule information, memo, photo data, music data, anniversary information, etc.
  • personal identification information or financial information such as social security number, bank account number, password, phone book, call log, text message, schedule information, memo, photo data, music data, anniversary information, etc.
  • FIG. 4 is a flowchart illustrating a procedure of a method for providing a personal information protection service of a mobile communication terminal according to the first embodiment of the present invention.
  • the information protection means provided in the terminal is executed to perform a procedure of driving a function.
  • the information protection means is driven together with the driving of the terminal and is always driven when the terminal is used.
  • the information protection means When the information protection means is driven, a procedure of accessing the information security operation server via the mobile communication network is performed. At this time, the connection is attempted through the address and the access protocol of the information security operation server.
  • the procedure to maintain the normal state of the normal terminal proceeds.
  • the procedure from step S30 is continuously performed to monitor whether the terminal is in a lost state in real time or periodically. In this case, monitoring may be performed at all times or the procedure from step S30 may be performed at regular intervals. This is done in consideration of the load of the terminal, server and communication network. (S60, 65)
  • step S60 when it is confirmed in the step S60 that the state is lost, a procedure for activating the security process of the information protection means is carried out.
  • the security processing of the information protection means is activated, the terminal enters the information security mode and the information security processing is performed according to the preset security processing scenario.
  • a process of performing the security processing of the stored personal information data is performed according to a preset scenario such as deleting personal information, backup, encryption, etc. (S80).
  • FIG. 5 is a diagram illustrating a signal flow between nodes in a method of providing a personal information protection service of a mobile communication terminal according to a first embodiment of the present invention.
  • the information protection means of the mobile communication terminal periodically accesses the information protection operation server.
  • it will be described as a case where a loss or theft report is received through the customer center and provided to the information security operation server.
  • a mobile communication terminal (hereinafter referred to as a terminal) transmits a connection request signal to an information protection operation server (hereinafter referred to as a server) in accordance with the operation of a self-contained information protection means to perform an access process.
  • a server an information protection operation server
  • the terminal Upon connection, the terminal transmits a status check request signal to the server to check the status of the server by querying the DB of the server.
  • the terminal owner loses the terminal and reports the terminal loss through the customer center, and the customer center transmits a reception request signal for the loss report to the server.
  • the server performs a procedure of registering the lost state of the terminal in the DB according to the loss report acceptance request. (5)
  • the terminal transmits a connection request signal to the server again as the time elapses for a predetermined period to proceed with the connection process.
  • the terminal After the terminal connects to the server, the terminal transmits a status check request signal of whether the terminal is lost, and the server checks the DB to confirm the lost state of the terminal.
  • the corresponding terminal confirms that the lost state and transmits the lost state information to the terminal.
  • a security processing process is activated in a running information protection means, and information security processing according to a security processing scenario set in advance is performed according to this security processing process.
  • FIG. 6 is a diagram illustrating a configuration of a system in which a method for providing a personal information protection service of a mobile communication terminal according to a second embodiment of the present invention is implemented.
  • the system according to the second embodiment of the present invention provides a mobile communication service to the mobile communication system by wirelessly connecting the mobile communication network 5000 and the base station 5010 provided in the mobile communication network 5000.
  • a plurality of mobile communication terminals (1010, 1020, 1030) provided with an information protection means provided with the information protection operating server 2000 having a database 2500 is connected through the mobile communication network (5000).
  • the customer center 3100 is connected to the information security operation server 2000, and the customer 4000 requests the customer center 3100 or the information security operation server 2000 to accept theft or loss.
  • the information protection operation server 2000 stores the lost state information of the terminal in the lost state information database 2500 according to the loss or theft reception of the mobile communication terminal, and is lost through the base station 5010 in the lost region of the terminal. It plays a role of broadcasting signal information.
  • the information security operation server 2000 is connected to a mobile communication network, and is a server device to which a mobile communication terminal can access through a mobile communication network.
  • the information protection operation server 2000 is received through the customer center 3100, after receiving the theft or loss incident, receives the fact of registration and registers the lost state of the terminal in the database 2500 and broadcasts the lost information.
  • the terminal may receive a lost or stolen reception terminal through wire / wireless communication means and offline directly from the customer 4000. In this case, the lost state registration and broadcasting processing of the terminal is performed together with the reception.
  • the customer center 3100 is an on / offline service center for mobile subscribers operating in a mobile communication system.
  • the customer center 3100 performs customer service and includes a terminal loss and theft report reception process.
  • the customer center 3100 may provide a personal information protection service in the information protection operation server 2000 by providing a loss incident reception fact to the information protection operation server 2000 after receiving the loss report.
  • the customer 4000 reports a loss to the customer center 3100 or the information protection operation server 2000 when the mobile communication terminal owned by the customer 4000 is lost or stolen.
  • the customer center 3100 or the information security operation server 2000 performs the authentication procedure of identity verification and identity terminal, and then proceeds with the loss acceptance procedure.
  • the mobile communication terminals 1010, 1020, and 1030 are portable communication terminal devices that are connected to the mobile communication network 5000 and receive a mobile communication service.
  • the mobile communication terminals 1010, 1020, and 1030 are interlocked with the information protection operation server 2000 by providing information protection means. It is a device that can receive personal information protection service.
  • the mobile communication terminal is provided with an information protection means to receive broadcast information including a lost signal broadcasted through the base station 5010 of the mobile communication system in the information protection operating server 2000, and recognizes the lost signal After querying the lost state to the operation server 2000, information security processing is performed according to whether or not it is lost.
  • FIG. 7 is a diagram illustrating a configuration of an information protection operating server 2000 in a system for providing a personal information protection service of a mobile communication terminal according to a second embodiment of the present invention.
  • the information protection operation server 2000 includes a loss registration processing module 2100, a location information extraction module 2200, a loss signal broadcasting processing module 2300, and a loss.
  • the loss registration processing module 2100 receives a loss and theft report of the mobile communication terminal, and registers in the DB 2500.
  • the loss registration processing module 2100 includes a report accepting unit 2120, a DB registering unit 2140, and the like.
  • the report receiving unit 2120 serves to receive the information received the terminal theft and loss report from the customer center 3100.
  • the terminal loss report may include location information of the terminal lost area directly input from the customer.
  • the report receiving unit 2120 also serves to receive and process the loss and theft report directly from the customer 4000.
  • the DB registration unit 2140 stores the lost terminal information received by the report accepting unit 2120 in the lost state information DB 2500 and performs a registration process.
  • the corresponding area information or location information may be stored together in the lost state information DB 2500.
  • the location information extraction module 2200 extracts a lost location of a corresponding terminal when the lost report is received by the lost registration processing module 2100.
  • the location information extraction module 2200 includes an LBS processor 2220 and an input information processor 2240.
  • the LBS processor 2220 extracts the location information of the lost terminal using the LBS system of the mobile communication system.
  • the LBS system is a location based service (Location Based Service) system is a service system that provides the current location information of the terminal using the base station information, etc. when registering the location of the terminal.
  • Location based service Location Based Service
  • the input information processing unit 2240 performs a role of inquiring a terminal lost area or location information directly inputted when a terminal loss report is received and extracting the location information.
  • the location information to be inquired is lost location and area information input by a customer who is receiving and managing the loss registration processing module 2100 when the loss report is received and stored in the DB 2500.
  • the lost signal broadcast processing module 2300 performs a process of broadcasting the broadcast information including the lost signal information to the lost area of the terminal according to the terminal loss report reception. That is, the loss signal broadcast processing module 2300 controls to broadcast the loss signal to the lost area of the terminal extracted by the location information extraction module 2200 when the loss registration report is received by the loss registration processing module 2100. It plays a role.
  • the lost signal broadcast processing module 2300 includes a base station selector 2320, a broadcast information synthesis controller 2340, and the like.
  • the base station selector 2320 selects a base station to broadcast a lost signal to a region where the terminal is lost. That is, it performs a role of selecting a base station to cover the area based on the lost location information and area information of the terminal. In this case, information is shared by interworking or linking with a mobile communication system, and a base station is selected.
  • the broadcast information synthesizing control unit 2340 plays a role of synthesizing to include a missing signal in a broadcast information message broadcasted through a selected base station through a broadcast channel.
  • various information is recorded in a reserved field, and the missing signal is included in any one of these fields.
  • the lost signal is synthesized to be recorded in a specific field not reserved in the broadcast information message of the broadcast channel.
  • this particular field is made to be mutually agreed with the mobile communication terminal 1000 provided with the information protection means. That is, it promises the mobile communication terminal equipped with the information protection means that the loss signal is recorded in the specific field.
  • the reason why the loss signal is recorded in a specific unreserved field is to prevent the operation of the mobile communication system. Therefore, the general mobile communication terminal, i.e., the mobile communication terminal without the information protection means cannot recognize the corresponding field, and does not have any correlation even if the loss report is recorded in the corresponding field.
  • the lost state information DB 2500 is a database in which terminal loss status information is stored in a database.
  • the lost state information DB 2500 may store terminal identification information and corresponding loss state information, and may further store lost region and location information.
  • the lost state information of the terminal is also normally recorded and stored in the lost state information DB 2500.
  • FIG. 8 is a diagram illustrating a configuration of a mobile communication terminal 1000 in a system for providing a personal information protection service of a mobile communication terminal according to a second embodiment of the present invention.
  • the mobile communication terminal 1000 includes components of a general mobile communication terminal, including a storage module 1200 in which user's personal information is stored, and further protects information.
  • the module 1100 further includes.
  • the information protection module 1100 is a means for receiving a broadcast including a terminal loss signal through a mobile communication network, and providing a personal information protection service by interworking with the information protection operation server 2000 through a mobile communication network.
  • the information protection module 1100 is a software program of a client or agent structure provided in the terminal and driven. In addition, the information protection module 1100 is driven together with the driving of the mobile communication terminal 1000 to provide a personal information protection service.
  • the information protection module 1100 includes a broadcast receiving unit 1110, a loss signal determining unit 1120, a server connection processing unit 1130, a loss determining unit 1140, a security processing unit 1150, and the like.
  • the broadcast receiving unit 1110 receives a broadcast information message broadcasted through a base station of a mobile communication system through a broadcast channel.
  • the broadcast receiver 1110 includes a one-way reception channel that always receives information broadcast from a base station of a surrounding area.
  • the lost signal determination unit 1120 determines whether a lost terminal signal is included in the received broadcast information message. In this case, it is determined whether a lost signal is recorded in the corresponding field by referring to a predetermined field in the broadcast information message.
  • the missing signal recorded in the specific field may be in the form of a flag signal indicating two types of normal state and lost state.
  • the server access processing unit 1130 When the loss signal is detected by the loss signal determination unit 1120, the server access processing unit 1130 performs a role of access processing to access the information protection operation server 2000 and perform information communication.
  • the server connection processing unit 1130 is provided with an access address and an access protocol to the information security operation server 2000 to enable a smooth connection to the server during the connection processing.
  • the loss determination unit 1140 checks the database 2500 of the information protection operation server 2000 and checks whether the current terminal is in a lost state. That is, the loss determination unit 1140 checks whether the terminal is registered in the lost state in the operation server 2000 connected through the server connection processing unit 1130. In this case, when the corresponding terminal is registered in the lost state, it performs a role of informing the security processing unit 1150 to be described later.
  • the security processing unit 1150 performs security processing on personal information stored in the terminal. That is, when the security processing unit 1150 confirms the loss state by the loss determination unit 1140, the security processing unit 1150 performs the personal information security processing according to a preset scenario.
  • the personal information security processing executes a preset security processing scenario.
  • Examples of the security processing scenario include deletion of personal information, backup processing of personal information, encryption processing of personal information, lost location transmission processing, and peripheral information.
  • the transfer process, the process of initializing a mobile communication terminal, etc. are mentioned.
  • the process of initializing the mobile communication terminal means resetting the mobile communication terminal to the initial release state.
  • the deletion process is a process of preventing the leakage of personal information by deleting the personal information 1210 stored in the storage module 1200 of the terminal.
  • the backup process is a process of transferring personal information to the information protection operation server 2000 that is being accessed, and then deleting it to prevent leakage after information backup.
  • the encryption process encrypts the personal information being stored in the storage module 1200 by receiving an encryption key from the information protection operation server 2000 being connected.
  • the encryption key may be stored in the terminal from the beginning.
  • the decryption key corresponding to the encryption key is received from the operation server to restore the personal information data.
  • the lost location transmission process is a process of transmitting the current location information of the terminal to the server that is connected after protecting the personal information in the above security processing scenario.
  • the peripheral information transmission process is a process of driving the camera of a terminal, photographing the surrounding environment, and transmitting it to the server which is connected. These processes are used to provide information that can recover lost terminals.
  • the storage module 1200 is a recording means capable of storing data in the terminal or storing various information.
  • the personal information 1210 is stored and managed in the storage module 1200.
  • Examples of the personal information 1210 stored in the terminal are personal identification information or financial information such as social security number, bank account number, password, phone book, call log, text message, schedule information, memo, photo data, music data, anniversary information, etc.
  • personal identification information or financial information such as social security number, bank account number, password, phone book, call log, text message, schedule information, memo, photo data, music data, anniversary information, etc.
  • Like information information about all users who require confidentiality to others.
  • FIG. 9 is a flowchart illustrating a procedure of a method for providing a personal information protection service of a mobile communication terminal according to a second embodiment of the present invention.
  • a procedure of receiving a loss report of a terminal from a customer who has lost the terminal is performed in the information protection operation server 2000.
  • the loss protection report may be directly received from the customer in the information protection operation server, or the loss report information may be received from the customer center 3100 of the mobile communication system to process the loss receipt.
  • the lost report can be received along with the information of the lost location or area information (S100).
  • a procedure of registering and storing the lost state of the terminal in the lost state information DB 2500 is performed.
  • the location or area information is also registered and stored in the corresponding DB.
  • a procedure of registering a lost state and simultaneously extracting location information of the lost terminal is performed.
  • the location information of the terminal is extracted by using the LBS system of the mobile communication system. Or, if the location information or area information of the lost terminal is registered in the lost state information DB 2500, the corresponding information is extracted and used.
  • a procedure for broadcasting a loss signal indicating a loss of a terminal to a region indicated by the extracted location information through a broadcast channel is performed.
  • the broadcast information message including the lost signal is transmitted to a specific field previously promised to the base station corresponding to the region of the extracted lost terminal.
  • the mobile communication terminals located in the region receive the broadcast.
  • the terminals provided with the information protection means inquire the specific field promised in the received broadcast information message, confirm that the lost signal is recorded in the corresponding field, and return to the information protection operation server 2000.
  • the connection procedure is in progress. That is, only the terminals operating with the information protection means may recognize the lost signal included in the broadcast information message, and the terminal which recognizes the connection may access the information protection operation server 2000 (S500).
  • the mobile communication terminals connected to the information protection operation server 2000 proceed with the procedure of checking the lost status information DB 2500 provided in the server to check the status. That is, it checks whether the lost state by querying the DB through its terminal identification information (S600).
  • a procedure of activating the personal information security process is performed through the information protection means provided in the terminal. This is a procedure for allowing the own terminal to recognize the lost state and start the security process for the stored personal information.
  • the information security processing is performed to proceed the security processing of the stored personal information data according to a preset security processing scenario such as deletion of personal information, backup, encryption, etc. (S900).
  • FIG. 10 is a diagram illustrating a procedure for performing information protection processing of a lost terminal according to each node according to a method for providing a personal information protection service of a mobile communication terminal according to a second embodiment of the present invention.
  • terminal # 003 is a terminal which is provided with information protection means and is actually lost
  • terminal # 002 is a terminal equipped with information protection means
  • terminal # 001 is information protection. It is assumed that it is a general terminal without means.
  • a procedure of receiving a loss report of a terminal from the customer center 3100 to the information protection operation server 2000 (hereinafter, referred to as a server) is performed.
  • the loss report may be received directly from the customer to the server.
  • the server receives the loss report and registers the lost state of the terminal in the lost state information DB 2500.
  • the lost location and region information input by the customer may be used, or the location information may be extracted through the LBS system of the mobile communication system.
  • a procedure of selecting a base station capable of transmitting a broadcast by covering a corresponding area is performed.
  • base station A is selected.
  • step B the base station A selected according to the broadcast request including the missing signal is broadcast.
  • the broadcast transmitted from the base station A is received by the terminals (terminal # 001, terminal # 002, terminal # 003) located around the base station A.
  • terminal # 001 terminal # 002, terminal # 003
  • the terminal # 002 which is a terminal provided with the information protection means and the terminal # 003 read and recognize a lost signal. That is, the terminal # 001 without the information protection means receives the broadcast but cannot recognize the lost signal included in the broadcast.
  • terminals # 002 and # 003 that recognize the lost signal are connected to the server.
  • the lost state information DB 2500 is queried to check whether its own terminal is in a lost state.
  • the terminal # 002 is confirmed to be in a normal state, and the terminal # 003 performs a procedure of recognizing that the lost state.
  • the terminal # 003 activates the personal information security processing through the information protection means, and proceeds to perform the personal information security processing according to the security processing scenario.
  • the present invention can be applied to the security processing technology of the personal information and its service to prevent the personal information stored in the lost personal portable communication terminal from being leaked by another person.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention concerne une technique qui empêche la fuite d'informations privées stockées dans un terminal de communication mobile, auxquelles d'autres personnes peuvent accéder lorsque le terminal de communication mobile est volé ou perdu. Plus particulièrement, cette invention concerne un procédé et un système qui empêchent la fuite d'informations privées et leurs accès par d'autres personnes, par suppression, sauvegarde et suppression ou chiffrement des informations privées contenues dans le terminal de communication mobile ou initialisation du terminal de communication mobile après confirmation de la perte du terminal de communication mobile.
PCT/KR2010/005183 2009-08-07 2010-08-06 Procédé et appareil pour fournir un service de protection aux informations privées d'un terminal de communication mobile WO2011016700A2 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR10-2009-0072781 2009-08-07
KR10-2009-0072782 2009-08-07
KR1020090072781A KR101124585B1 (ko) 2009-08-07 2009-08-07 이동통신 단말의 개인정보 보호 서비스 제공 방법 및 시스템
KR1020090072782A KR20110015191A (ko) 2009-08-07 2009-08-07 이동통신 단말의 개인정보 보호 서비스 제공 방법 및 시스템

Publications (2)

Publication Number Publication Date
WO2011016700A2 true WO2011016700A2 (fr) 2011-02-10
WO2011016700A3 WO2011016700A3 (fr) 2011-06-03

Family

ID=43544807

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2010/005183 WO2011016700A2 (fr) 2009-08-07 2010-08-06 Procédé et appareil pour fournir un service de protection aux informations privées d'un terminal de communication mobile

Country Status (1)

Country Link
WO (1) WO2011016700A2 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050065306A (ko) * 2003-12-24 2005-06-29 주식회사 안랩유비웨어 무선통신 단말기의 개인정보 보호 장치 및 그 방법과 원격제어를 이용한 개인정보 관리 장치 및 그 방법
JP2006279321A (ja) * 2005-03-28 2006-10-12 Willcom Inc 移動端末のためのセキュリティソフトウェア及びセキュリティ通信システム
KR20060116089A (ko) * 2005-05-09 2006-11-14 에스케이 텔레콤주식회사 데이터 라디오 채널을 이용해 분실된 이동통신 단말기의콘텐츠를 보호하는 방법
KR20090065975A (ko) * 2007-12-18 2009-06-23 주식회사 케이티프리텔 단말 도난시 개인 정보 보호 방법 및 시스템

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050065306A (ko) * 2003-12-24 2005-06-29 주식회사 안랩유비웨어 무선통신 단말기의 개인정보 보호 장치 및 그 방법과 원격제어를 이용한 개인정보 관리 장치 및 그 방법
JP2006279321A (ja) * 2005-03-28 2006-10-12 Willcom Inc 移動端末のためのセキュリティソフトウェア及びセキュリティ通信システム
KR20060116089A (ko) * 2005-05-09 2006-11-14 에스케이 텔레콤주식회사 데이터 라디오 채널을 이용해 분실된 이동통신 단말기의콘텐츠를 보호하는 방법
KR20090065975A (ko) * 2007-12-18 2009-06-23 주식회사 케이티프리텔 단말 도난시 개인 정보 보호 방법 및 시스템

Also Published As

Publication number Publication date
WO2011016700A3 (fr) 2011-06-03

Similar Documents

Publication Publication Date Title
WO2018101727A1 (fr) Procédé et système de prévention de violation d'informations personnelles, dans lesquels une authentification biométrique et une division de phase d'un processus d'authentification sont combinées
WO2009107994A2 (fr) Procédé et système permettant de fournir un service de contrôle des informations personnelles pour un terminal de communication mobile
WO2014104777A2 (fr) Système et procédé d'ouverture de session sécurisée, et appareil correspondant
WO2013069841A1 (fr) Appareil de verrouillage à sécurité renforcée utilisant une image de l'iris
WO2015023109A1 (fr) Système de sécurité, appareil et procédé utilisant un code supplémentaire
WO2013111992A1 (fr) Système et procédé pour prévenir l'abus d'appels d'urgence placés à l'aide d'un téléphone intelligent
WO2010068073A2 (fr) Procédé de fourniture de service utilisant des données d'identification de dispositif, son dispositif et support lisible par ordinateur sur lequel son programme est enregistré
CN102955904A (zh) 防止移动通讯设备泄密的方法和系统
WO2009145499A2 (fr) Procédé et appareil de gestion de jetons pour une gestion de droits numériques
WO2012060479A1 (fr) Système pour fournir un service d'authentification et de gestion de données de position et procédé pour son fonctionnement
WO2011090227A1 (fr) Procédé de raccordement prioritaire pour un récepteur désigné d'un appel téléphonique d'urgence et système associé
WO2018151392A1 (fr) Procédé intelligent d'ouverture de session faisant appel à un service de messagerie et appareil associé
WO2019088411A1 (fr) Système de changement de numéro d'appel et procédé de fourniture de service de changement de numéro d'appel
WO2011040673A1 (fr) Procédé et appareil pour configurer un contenu multimédia d'identification d'appelant
WO2011016700A2 (fr) Procédé et appareil pour fournir un service de protection aux informations privées d'un terminal de communication mobile
JP2000253457A (ja) 個人情報保護機能付き携帯端末装置
WO2017078358A1 (fr) Système et procédé de communication de sécurité utilisant la biométrie
WO2011074878A2 (fr) Système de sécurisation de services et son procédé
JP4882532B2 (ja) 所在管理システム、情報管理システム、サーバ装置、所在管理方法、および情報管理方法
KR20110015191A (ko) 이동통신 단말의 개인정보 보호 서비스 제공 방법 및 시스템
WO2017034098A1 (fr) Procédé de fourniture d'un service de notification de modification d'informations et système permettant d'exécuter ledit procédé
KR101124585B1 (ko) 이동통신 단말의 개인정보 보호 서비스 제공 방법 및 시스템
JP2001325435A (ja) カード認証方法および認証システム
JP2000137809A (ja) 携帯型情報処理装置
KR100711097B1 (ko) 무선통신 단말기의 개인정보 보호 장치 및 그 방법과 원격제어를 이용한 개인정보 관리 장치 및 그 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10806674

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16/05/2012)

122 Ep: pct application non-entry in european phase

Ref document number: 10806674

Country of ref document: EP

Kind code of ref document: A2